CSCI-1680 Wireless Rodrigo Fonseca

Similar documents
Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

Lecture 16: Wireless Networking

CMPE 257: Wireless and Mobile Networking

Last Lecture: Data Link Layer

15-441: Computer Networking. Wireless Networking

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Mobile and Sensor Systems

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Mohamed Khedr.

Wireless MACs: MACAW/802.11

Strengthening Unlicensed Band Wireless Backhaul

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Multiple Access in Cellular and Systems

ECE 4450:427/527 - Computer Networks Spring 2017

Wireless and Mobile Networks 7-2

CSE 461: Wireless Networks

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Link Layer: Retransmissions

Local Area Networks NETW 901

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

MSIT 413: Wireless Technologies Week 8

CSE 461: Multiple Access Networks. This Lecture

Chapter 6 Wireless and Mobile Networks

MULTIPLE ACCESS PROTOCOLS 2. 1

CMPE 257: Wireless and Mobile Networking

CS 3640: Introduction to Networks and Their Applications

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

CSE 461 Multiple Access. David Wetherall

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSC 4900 Computer Networks: Wireless Networks

Rahman 1. Application

Wireless and Mobile Networks

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Wireless Intro : Computer Networking. Wireless Challenges. Overview. TCP on wireless links Wireless MAC Assigned reading.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSE/EE 461 Wireless and Contention-Free Protocols

Wireless LANs. ITS 413 Internet Technologies and Applications

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CE693: Adv. Computer Networking

Wireless LAN. Access Point. Provides network connectivity over wireless media

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

Multiple Access Links and Protocols

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Topics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Logical Link Control (LLC) Medium Access Control (MAC)

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

CSCI-1680 Wireless Chen Avin

Links. CS125 - mylinks 1 1/22/14

15-441: Computer Networking

Mohammad Hossein Manshaei 1393

Medium Access Control Sublayer Chapter 4

Media Access Control in Ad Hoc Networks

COMP 3331/9331: Computer Networks and Applications

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Lecture 16: QoS and "

Data and Computer Communications. Chapter 13 Wireless LANs

Wireless Local Area Networks. Networks: Wireless LANs 1

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

Computer Networks. Wireless LANs

CS 332 Computer Networks Wireless Networks

Wireless Network Security Spring 2013

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Wireless Network Security Spring 2014

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CS263: Wireless Communications and Sensor Networks

Wireless Communications

INTRODUCTION TO WIRELESS LAN, MAC PROTOCOLS and INTERFERENCE. Choong Seon Hong, KHU

Collisions & Virtual collisions in IEEE networks

CSE 6811 Ashikur Rahman

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

EE 122: Ethernet and

ECE 158A: Lecture 13. Fall 2015

CS263: Wireless Communications and Sensor Networks

Wireless Network Security Spring 2015

Sample solution to Midterm

The Medium Access Control Sublayer

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Advanced Computer Networks WLAN

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Wireless networks. Wireless Network Taxonomy

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Wireless Network and Mobility

Hands-On Exercises: IEEE Standard

Transcription:

CSCI-1680 Wireless Rodrigo Fonseca Based partly on lecture notes by Sco2 Shenker and John Janno6

Wireless Today: wireless networking truly ubiquitous 802.11, 3G, (4G), WiMAX, Bluetooth, RFID, Sensor networks, Internet of ings Some new computers have no wired networking 4B cellphone subscribers vs. 1B computers What s behind the scenes?

Wireless is different Signals sent by the sender don t always reach the receiver intact Varies with space: attenuation, multipath Varies with time: conditions change, interference, mobility Distributed: sender doesn t know what happens at receiver Wireless medium is inherently shared No easy way out with switches

Implications Different mechanisms needed Physical layer Different knobs: antennas, transmission power, encodings Link Layer Distributed medium access protocols Topology awareness Network, Transport Layers Routing, forwarding Most advances do not abstract away the physical and link layers

Physical Layer Specifies physical medium Ethernet: Category 5 cable, 8 wires, twisted pair, R45 jack WiFi wireless: 2.4GHz Specifies the signal 100BASE-TX: NRZI + MLT-3 encoding 802.11b: binary and quadrature phase shi keying (BPSK/ QPSK) Specifies the bits 100BASE-TX: 4B5B encoding 802.11b @ 1-2Mbps: Barker code (1bit -> 11chips)

What can happen to signals? Attenuation Signal power attenuates by ~r 2 factor for omni-directional antennas in free-space Exponent depends on type and placement of antennas < 2 for directional antennas > 2 if antennas are close to the ground

Interference External sources E.g., 2.4GHz unlicensed ISM band 802.11 802.15.4 (ZigBee), 802.15.1 (Bluetooth) 2.4GHz phones Microwave ovens Internal sources Nodes in the same network/protocol can (and do) interfere Multipath Self-interference (destructive)

Multipath May cause attenuation, destructive interference Picture from Cisco, Inc.

Signal (+ Interference) to Noise Ratio Remember Shannon? Shannon-Hartley C Capacity B maximum frequency of signal M number of discrete levels per symbol C = 2B log 2 (M) bits/sec (1) But noise ruins your party C = B log 2 (1 + S/N) bits/sec (2) (1) (2) => M 1 + S/N Noise limits your ability to distinguish levels For a fixed modulation, increases Bit Error Rate (BER) Could make signal stronger Uses more energy Increases interference to other nodes

Wireless Modulation/Encoding More complex than wired Modulation, Encoding, Frequency Frequency: number of symbols per second Modulation: number of chips per symbol E.g., different phase, frequency, amplitude Encoding: number of chips per bit (to counter errors) Example 802.11b, 1Msps: 11Mcps, DBPSK, Barker Code 1 chip per symbol, 11 chips/bit 802.11b, 2Msps: 11Mcps, DQPSK, Barker Code 2 chips per symbol, 11 chips/bit

Link Layer Medium Access Control Should give 100% if one user Should be efficient and fair if more users Ethernet uses CSMA/CD Can we use CD here? No! Collision happens at the receiver Protocols try to avoid collision in the first place

Hidden Terminals B A C A can hear B and C B and C can t hear each other ey both interfere at A B is a hidden terminal to C, and vice-versa Carrier sense at sender is useless

Exposed Terminals B A C D A transmits to B C hears the transmission, backs off, even though D would hear C C is an exposed terminal to A s transmission Why is it still useful for C to do CS?

Key points No global view of collision Different receivers hear different senders Different senders reach different receivers Collisions happen at the receiver Goals of a MAC protocol Detect if receiver can hear sender Tell senders who might interfere with receiver to shut up

Simple MAC: CSMA/CA Maintain a waiting counter c For each time channel is free, c-- Transmit when c = 0 When a collision is inferred, retransmit with exponential backoff Use lack of ACK from receiver to infer collision Collisions are expensive: only full packet transmissions How would we get ACKs if we didn t do carrier sense?

RTS/CTS Idea: transmitter can check availability of channel at receiver Before every transmission Sender sends an RTS (Request-to-Send) Contains length of data (in time units) Receiver sends a CTS (Clear-to-Send) Sender sends data Receiver sends ACK a er transmission If you don t hear a CTS, assume collision If you hear a CTS for someone else, shut up

RTS/CTS B RTS A C

RTS/CTS B CTS A C

RTS/CTS B Data A C

Benefits of RTS/CTS Solves hidden terminal problem Does it? Control frames can still collide E.g., can cause CTS to be lost In practice: reduces hidden terminal problem on data packets

Drawbacks of RTS/CTS Overhead is too large for small packets 3 packets per packet: RTS/CTS/Data (4-22% for 802.11b) RTS still goes through CSMA: can be lost CTS loss causes lengthy retries 33% of IP packets are TCP ACKs In practice, WiFi doesn t use RTS/CTS

Other MAC Strategies Time Division Multiplexing (TDMA) Central controller allocates a time slot for each sender May be inefficient when not everyone sending Frequency Division Multiplexing two networks on same space Nodes with two radios (think graph coloring) Different frequency for upload and download

ISM Band Channels

Network Layer What about the network topology? Almost everything you use is single hop! 802.11 in infrastructure mode Bluetooth Cellular networks WiMax (Some 4G networks) Why? Really hard to make multihop wireless efficient

WiFi Distribution System 802.11 typically works in infrastructure mode Access points fixed nodes on wired network Distribution system connects Aps Typically connect to the same Ethernet, use learning bridge to route to nodes MAC addresses Association Node negotiates with AP to get access Security negotiated as well (WEP, WPA, etc) Passive or active

Wireless Multi-Hop Networks Some networks are multihop, though! Ad-hoc networks for emergency areas Vehicular Networks Sensor Networks E.g., infrastructure monitoring Multihop networking to share Internet access E.g. Meraki

Many Challenges Routing Link estimation Multihop throughput dropoff

e Routing Problem D R S Find a route from S to D Topology can be very dynamic

Routing Routing in ad-hoc networks has had a lot of research General problem: any-to-any routing Simplified versions: any-to-one (base station), one-toany (dissemination) DV too brittle: inconsistencies can cause loops DSDV Destination Sequenced Distance Vector

DSDV Charles Perkins (1994) Avoid loops by using sequence numbers Each destination increments own sequence number Only use EVEN numbers A node selects a new parent if Newer sequence number or Same sequence number and better route If disconnected, a node increments destination sequence number to next ODD number! No loops (only transient loops) Slow: on some changes, need to wait for root

Many Others DSR, AODV: on-demand Geographic routing: use nodes physical location and do greedy routing Virtual coordinates: derive coordinates from topology, use greedy routing Tree-based routing with on-demand shortcuts

Routing Metrics How to choose between routes? Hopcount is a poor metric! Paths with few hops may use long, marginal links Must find a balance All links do local retransmissions Idea: use expected transmissions over a link as its cost! ETX = 1/(PRR) (Packet Reception Rate) Variation: ETT, takes data rate into account

Multihop roughput Only every third node can transmit! Assuming a node can talk to its immediate neighbors (1) Nodes can t send and receive at the same time (2) ird hop transmission prevents second hop from receiving (3) Worse if you are doing link-local ACKs In TCP, problem is worse as data and ACK packets contend for the channel! Not to mention multiple crossing flows!

Sometimes you can t (or shouldn t) hide that you are on wireless! ree examples of relaxing the layering abstraction

Examples of Breaking Abstractions TCP over wireless Packet losses have a strong impact on TCP performance Snoop TCP: hide retransmissions from TCP end-points Distinguish congestion from wireless losses

4B Link Estimator Uses information from Physical, Routing, and Forwarding layers to help estimate link quality Average Cost (xmits/packet) 3 2.5 2 1.5 White/Compare Bits 45% Ack Bit: Unidir. Est. Ack Bit: Unidir. Est. White/Compare Bits 4B CTP + white bit CTP + unidir CTP T2 MultiHopLQI Cost = Depth 1.5 2 2.5 3 Average Tree Depth (hops)

Stanford s Full Duplex Wireless Status quo: nodes can t transmit and receive at the same time Why? TX energy much stronger than RX energy Key insight: With other tricks, 92% of optimal bandwidth

Summary Wireless presents many challenges Across all layers Encoding/Modulation (we re doing pretty well here) Distributed multiple access problem Multihop Most current protocols sufficient, given over provisioning (good enough syndrome) Other challenges Smooth handoff between technologies (3G, Wifi, 4G ) Low-cost, long range wireless for developing regions Energy usage

Next Time Rodrigo out of town (last time!): Stephen will present Network programming Some techniques for high performance servers Going beyond sockets: a few network programming frameworks Virtual Interfaces (tun/tap)